Events Archive

Information assurance and cyber security has changed quite a bit since the days of access control lists, firewalls and intrusion prevention systems. Today, in countering modern malicious attacks, leveraging bulk filtering and blocking solutions can result in a significantly degraded network and drive a threat scenario that is more complex than can be easily countered. This presentation covers many forms of attacks that require active mitigation that is not focused on filtering but rather adapting the threat through manipulation of transactions. Over the last several years, DNS based threats have shown us the need for scalable cache and response systems, response content redaction to prevent network mapping, and how DNS is used for indirect communications. Furthermore, large scale DDoS and BOTNET attacks have shown the requirement for scalable TCP SYN Defense and CAPTCHA based solutions to distinguish between valid users and automated systems. Furthermore, the growth of large quantities of zombie systems using indirect command and control pathways drives the need to utilize client identification and notification solutions that can traverse the indirect communications pathways.

Presented by: Peder Jungck of CloudShield Technologies, Inc and SAIC

Peder is the CTO for the Cyber and Information Solutions Business Unit (CISBU) at SAIC as well as the CTO of SAIC’s wholly owned subsidiary CloudShield Technologies, Inc. which he founded in 2000. Peder is a networking industry visionary, IT executive and entrepreneur who pioneered high-speed content-based networking and cyber security systems to meet the needs of government, carriers, and large enterprises. He has been a guiding architect at several networking and security companies, has earned 15 patents and is a co-author of packetC the packet processing language for cyber security countermeasures and flexible network applications. Peder attended Clarkson University for electrical and computer engineering and received a Bachelor of Arts degree from Beloit College in mathematics and computer science.

Future Topics

Here is a list of topics we'd like to present at future Technical Tuesday events. If you have a presentation on one of these, or another technical cyber topic, please contact us.

Tor routing

Cellular Security

Malware reverse engineering

Cyber situational awareness

Geolocation of IP addresses

Cloud computing

Cloud forensics

Innovation

E-discovery

Attack attribution

Fuzzing

Writing secure code

Geolocation of mobile devices

Twitter

Follow us @cybergamut and use hashtag #cybergamut to join the conversation during Technical Tuesday events.